A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
On Lattice-Based Signatures with Advanced Functionalities
2022
While ordinary signature schemes based on lattices are ready to be deployed in practice, this statement cannot be made for lattice-based signature schemes with advanced functionalities. ...
In this thesis, we are specifically interested in lattice-based signature schemes with advanced functionalities. ...
With focus on signature schemes with advanced functionalities, we went on to analyze lattice-based (interactive) protocols with multiple rejection sampling procedures. ...
doi:10.26083/tuprints-00020793
fatcat:qpxpmsn32jdh3astw66cf63uzm
Lattice-based digital signatures
2021
National Science Review
We briefly outline the high-level constructions of two digital signature schemes based on lattice problems. ...
Lattice-based constructions generally present the most balanced options among cryptographic schemes offerring quantum security. ...
While the domain of the function in discrete log and RSA-based one-way functions are groups, the domains in lattice-based signatures are sets that are not closed under any operation -in particular, they ...
doi:10.1093/nsr/nwab077
pmid:34691740
pmcid:PMC8433088
fatcat:emaz7k42mbffnc6f5wfrszfknu
Practical Lattice-Based Digital Signature Schemes
2015
ACM Transactions on Embedded Computing Systems
The focus of this presentation will be to survey recent developments in lattice-based digital signature schemes and in particular practical schemes that have been shown to improve upon the performance ...
Its main advantage is that it allows for extended functionality and is, at the same time, more efficient for the basic primitives of public-key encryption and digital signatures. ...
Lattice-based cryptographic primitives can be utilised to form more advanced schemes, while digital signatures and public-key encryption based on lattices are now more practical than RSAbased equivalent ...
doi:10.1145/2724713
fatcat:2cck3r7y3rb7jghfuinosibixu
Efficient Identity-Based Signature from Lattices
[chapter]
2014
IFIP Advances in Information and Communication Technology
In this paper we present a new identity-based signature scheme from lattice problems. ...
This scheme is more efficient than other lattice-based identity-based signature schemes in terms of both computation and communication complexities. ...
Gaussians on Lattices The Gaussian function is a useful tool in lattice-based cryptography.
Definition 2. ...
doi:10.1007/978-3-642-55415-5_26
fatcat:kbcwfgsubbcflmbgimbfyqca54
Post-Quantum Cryptography: State of the Art
[chapter]
2016
Lecture Notes in Computer Science
The most advanced scheme is the hash-based signature scheme XMSS [14] . ...
Recent examples of lattice based public-key encryption schemes are [40, 69] and of lattice-based signature schemes are [22, 3] . ...
doi:10.1007/978-3-662-49301-4_6
fatcat:ylrv42q33fegnidacywmkzmvme
Satellite Networks for Key Management
2007
2007 3rd International Conference on Recent Advances in Space Technologies
Elliptic Curve Digital Signature
are those which utilize one single key that is used for the
Algorithm (ECDSA) [9]
Lattice
Lattices &
1. Lattice based cryptosystems [10]. ...
Although the issue of secrecy that where E is an encryption function with an encryption key of k2 traditionally has been dealt with cryptographic solutions has On plaintext P to obtain the ciphertext of ...
doi:10.1109/rast.2007.4283958
fatcat:nj7p4zwauzf6johdxcwfpy7h7q
Asymptotically Efficient Lattice-Based Digital Signatures
2017
Journal of Cryptology
We give a direct construction of digital signatures based on the complexity of approximating the shortest vector in ideal (e.g., cyclic) lattices. ...
Since no sub-exponential (in n) time algorithm is known to solve lattice problems in the worst case, even when restricted to cyclic lattices, our construction gives a digital signature scheme with an essentially ...
with a novel construction of a lattice based one-time signature. ...
doi:10.1007/s00145-017-9270-z
fatcat:gfylmwl4mbaxjid7j242gyiquu
Functional Encryption and Its Impact on Cryptography
[chapter]
2014
Lecture Notes in Computer Science
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained access control and selective computation on encrypted data, as is necessary to protect big, complex data ...
In this article, we provide a brief introduction to functional encryption, and an overview of its overarching impact on the field of cryptography. ⋆ wee@di.ens.fr. CNRS (UMR 8548) and INRIA. ...
Advances in attribute-based and functional encryption since 2012. ...
doi:10.1007/978-3-319-10879-7_18
fatcat:xpqhqqqjcnaddkdqwcvjpzcztu
Spectral and structural stability properties of charged particle dynamics in coupled latticesa)
2015
Physics of Plasmas
A theoretical framework and associated tools for analyzing the spectral and structural stability properties of coupled lattices are formulated in this paper, based on the recently developed generalized ...
Courant-Snyder theory for coupled lattices. ...
Starting from a stable lattice with a small phase advance, we can increase the focusing strength and thus the phase advance gradually. ...
doi:10.1063/1.4920961
fatcat:rf7dzruhrvblrixhgmm5jcfi4u
Post-Quantum Cryptosystems for Internet-of-Things: A Survey on Lattice-Based Algorithms
2021
IoT
The key aim of this survey was to provide the scientific community with comprehensive information on elementary mathematical facts, as well as to address real-time implementation, hardware architecture ...
by using computationally hard lattice problems (non-deterministic polynomial time hardness) to construct stable cryptographic functions. ...
Alan Woodward from University of Surrey, UK for the valuable discussions and lectures on post-quantum cryptography.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/iot2010005
fatcat:ja6nldq4mjafhb2bcyzhxa7efu
Resistant Blockchain Cryptography to Quantum Computing Attacks
2021
Zenodo
In addition, the most promising post quantum signature encryption and digital blockchain signature schemes are detailed in terms of the functionality and durability of the most promising public signatures ...
This paper reviews current scientists on quantum blockchain for such purposes. In addition, the major challenges are studied with the most important post-quantum blockchain systems. ...
First, a lattice issue-based signature scheme was proposed. The lattice base delegation algorithm was used to generate hidden keys using a random value selection. ...
doi:10.5281/zenodo.4497731
fatcat:e55cprj7tfbedfxc4krs5jh4ry
An Efficient Identity-Based Forward Secure Signature Scheme from Lattices
2021
OALib
In view of the excellent characteristics of lattice cipher and forward-secure digital signature scheme, the construction of identity-based forward-secure digital signature based on lattice technology has ...
However, the identity-based forward secure digital signature scheme on the existing grid has the disadvantage of excessive signature length. ...
In our research, we combine the trapdoor-free signature with the trapdoor base to realize the identity-based signature design that does not rely on the expansion of the lattice dimension, which will not ...
doi:10.4236/oalib.1107126
fatcat:fspbj32h4zdbdn6gco6nbfisni
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
2019
2019 IEEE 8th International Workshop on Advances in Sensors and Interfaces (IWASI)
Thirdly, LBC constructions offer extended functionality for advanced security services such as identity-based encryption (IBE) [8] attributebased encryption (ABE) and fully-homomorphic encryption (FHE ...
A further issue with standard lattice-based schemes is that they require matrix-vector multiplication with quadratic complexity. ...
Lattice-based PQC KEMs Saber [16] Key ...
doi:10.1109/iwasi.2019.8791343
dblp:conf/iwasi/KhalidMOL19
fatcat:7evkdnumwjaqbc23e6pz3uz4sa
Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks
2020
IEEE Access
However, the fast progress of quantum computing has opened the possibility of performing attacks based on Grover's and Shor's algorithms in the near future. ...
Furthermore, extensive comparisons are provided on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains. ...
This kind of schemes date back from the late 70s, when Lamport proposed a signature scheme based on a one-way function [198] . ...
doi:10.1109/access.2020.2968985
fatcat:7wsxhxrfojdmzcxtjtrk6cmcci
Page 10576 of Mathematical Reviews Vol. , Issue 2004m
[page]
2004
Mathematical Reviews
These techniques are used to construct lattice-based collision- resistant hash functions. ...
The eighth chapter, “Cryptographic functions”, describes gen- eral techniques used to design lattice-based cryptographic systems. ...
« Previous
Showing results 1 — 15 out of 29,716 results